Speak Up: Ransomware Attack Uses Voice Recognition New variant of Android ransomware comes with a bizarre twist.
Fewer Than One-Fourth Of Cybersecurity Job Candidates Are Qualified ISACA report finds that 55% of security jobs take three- to six months to fill, and under 25% of candidates are qualified for the jobs they apply for.
Why We Need To Reinvent How We Catalogue Malware One obvious trend: crimeware technologies that come with simple user consoles and functionality to create unique binaries at the click of a button.
6 Tips for Preventing Laptop Data Theft Experts point to stronger passwords, full-disk encryption, and multi-factor authentication as ways to stop data theft in the event a laptop is lost or stolen.
Tunneling Through The "Walls" Of IoT In The Enterprise The movie "Die Hard" has a thing or two to teach us about the pitfalls of the Internet of Things.
80% Of Web Applications Contain At Least One Security Bug Study by Contrast Security finds an average of 45 vulnerabilities per Web application.
Yahoo Trims Its Price Tag To Verizon By $350 Million Announcement of new deal price from the previous $4.8 billion allays fears of deal cancellation or even bigger price cut.